Search results for: income security
3575 On-Farm Diversification in Vietnam: Determinants and Trends
Authors: Diep Thanh Tung, Joachim Aurbacher
Abstract:
This study aims to measure the level of on-farm diversification in Vietnam. The empirical results of the research carried out reflect regional differences in terms of on-farm diversification and its determinants. Households in the northern regions have adapted to the fragmented and small-sized parcels of land held by diversifying their on-farm activities. In contrast, the Mekong delta region in the south of Vietnam is characterized by larger agricultural parcels and a specialization in rice production. Land use fragmentation, as reflected by a large number of plots in a given area, is one of the most important reasons for the high levels of on-farm diversification seen, while the higher share of non-farm income in total income is the reason of lower levels of on-farm diversification. Households have reacted to natural and economic shocks by diversifying their on-farm activities. The non-stationary Markov chain model used here shows various diversification scenarios and trends. In most cases, on-farm diversification generally tends to reduce over the next few years.Keywords: diversification, simpson index, fixed effects, non-stationary markov chain
Procedia PDF Downloads 4853574 Charcoal Production from Invasive Species: Suggested Shift for Increased Household Income and Forest Plant Diversity in Nepal
Authors: Kishor Prasad Bhatta, Suman Ghimire, Durga Prasad Joshi
Abstract:
Invasive Alien Species (IAS) are considered waste forest resources in Nepal. The rapid expansion of IAS is one of the nine main drivers of forest degradation, though the extent and distribution of this species are not well known. Further, the knowledge of the impact of IAS removal on forest plant diversity is hardly known, and the possibilities of income generation from them at the grass-root communities are rarely documented. Systematic sampling of 1% with nested circular plots of 500 square meters was performed in IAS removed and non-removed area, each of 30 hectares in Udayapur Community Forest User Group (CFUG), Chitwan, central Nepal to observe whether the removal of IAS contributed to an increase in plant diversity. In addition, ten entrepreneurs of Udaypur CFUG, involved in the charcoal production, briquette making and marketing were interviewed and interacted as well as their record keeping booklets were reviewed to understand if the charcoal production contributed to their income and employment. The average annual precipitation and temperature of the study area is 2100 mm and 34 degree Celsius respectively with Shorea robusta as main tree species and Eupatorium odoratum as dominant IAS. All the interviewed households were from the ̔below-poverty-line’ category as per Community Forestry Guidelines. A higher Shannon-Weiner plant diversity index at regeneration level was observed in IAS removed areas (2.43) than in control site (1.95). Furthermore, the number of tree seedlings and saplings in the IAS harvested blocks were significantly higher (p < 0.005) compared to the unharvested one. The sale of charcoal produced through the pyrolysis of IAS in ̔ Bio-energy kilns’ contributed for an average increased income of 30.95 % (Nepalese rupees 31,000) of the involved households. Despite above factors, some operational policy hurdles related to charcoal transport and taxation existed at field level. This study suggests that plant diversity could be increased through the removal of IAS, and considerable economic benefits could be achieved if charcoal is substantially produced and utilized.Keywords: briquette, economic benefits, pyrolysis, regeneration
Procedia PDF Downloads 2793573 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises
Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh
Abstract:
As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan
Procedia PDF Downloads 403572 A Review on Factors Influencing Implementation of Secure Software Development Practices
Authors: Sri Lakshmi Kanniah, Mohd Naz’ri Mahrin
Abstract:
More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.Keywords: secure software development, software development, software security, systematic literature review
Procedia PDF Downloads 3783571 Brazilian Public Security: Governability and Constitutional Change
Authors: Gabriel Dolabella, Henrique Rangel, Stella Araújo, Carlos Bolonha, Igor de Lazari
Abstract:
Public security is a common subject on the Brazilian political agenda. The seventh largest economy in the world has high crime and insecurity rates. Specialists try to explain this social picture based on poverty, inequality or public policies addressed to drug trafficking. This excerpt approaches State measures to handle that picture. Therefore, the public security - law enforcement institutions - is at the core of this paper, particularly the relationship among federal and state law enforcement agencies, mainly ruled by a system of urgency. The problems are informal changes on law enforcement management and public opinion collaboration to these changes. Whenever there were huge international events, Brazilian armed forces occupied streets to assure law enforcement - ensuring the order. This logic, considered in the long time, could impact the federal structure of the country. The post-madisonian theorists verify that urgency is often associated to delegation of powers, which is true for Brazilian law enforcement, but here there is a different delegation: States continuously delegate law enforcement powers to the federal government throughout the use of Armed Forces. Therefore, the hypothesis is: Brazil is under a political process of federalization of public security. The political framework addressed here can be explained by the disrespect of legal constraints and the failure of rule of law theoretical models. The methodology of analysis is based on general criteria. Temporally, this study investigates events from 2003, when discussions about the disarmament statute begun. Geographically, this study is limited to Brazilian borders. Materially, the analysis result from the observation of legal resources and political resources (pronouncements of government officials). The main parameters are based on post-madisonianism and federalization of public security can be assessed through credibility and popularity that allow evaluation of this political process of constitutional change. The objective is to demonstrate how the Military Forces are used in public security, not as a random fact or an isolated political event, in order to understand the political motivations and effects that stem from that use from an institutional perspective.Keywords: public security, governability, rule of law, federalism
Procedia PDF Downloads 6773570 Development of a Data Security Model Using Steganography
Authors: Terungwa Simon Yange, Agana Moses A.
Abstract:
This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.Keywords: steganography, cryptography, encryption, decryption, secrecy
Procedia PDF Downloads 2653569 Economic Activities Associated with Extraction of Riverbed Materials in the Tinau River, Nepal
Authors: Khet Raj Dahal, Dhruva Dhital, Chhatra Mani Sharma
Abstract:
A study was conducted during 2012 to 2013 in the selected reach of Tinau River, Nepal. The main objective of the study was to quantify employment and income generation from the extraction of construction materials from the river. A 10 km stretch of the river was selected for the study. Sample survey with a semi-structured questionnaire and field observation were the main tools used during field investigation. Extraction of riverbed materials from the banks, beds and floodplain areas of the river has provided many kinds of job opportunities for the people living in the vicinity of the river. It has also generated an adequate amount of revenues. The collected revenue has been invested for many kinds of social and infrastructures development for years. Though extraction of riverbed materials is beneficial for income and employment generation, it has also negative environmental impacts in and around the river. Furthermore, the study concluded that river bed extraction should be continued with special monitoring and evaluation in the areas where there is still room for extraction.Keywords: extraction, crusher plants, economic activities, Tinau River
Procedia PDF Downloads 6933568 Signs, Signals and Syndromes: Algorithmic Surveillance and Global Health Security in the 21st Century
Authors: Stephen L. Roberts
Abstract:
This article offers a critical analysis of the rise of syndromic surveillance systems for the advanced detection of pandemic threats within contemporary global health security frameworks. The article traces the iterative evolution and ascendancy of three such novel syndromic surveillance systems for the strengthening of health security initiatives over the past two decades: 1) The Program for Monitoring Emerging Diseases (ProMED-mail); 2) The Global Public Health Intelligence Network (GPHIN); and 3) HealthMap. This article demonstrates how each newly introduced syndromic surveillance system has become increasingly oriented towards the integration of digital algorithms into core surveillance capacities to continually harness and forecast upon infinitely generating sets of digital, open-source data, potentially indicative of forthcoming pandemic threats. This article argues that the increased centrality of the algorithm within these next-generation syndromic surveillance systems produces a new and distinct form of infectious disease surveillance for the governing of emergent pathogenic contingencies. Conceptually, the article also shows how the rise of this algorithmic mode of infectious disease surveillance produces divergences in the governmental rationalities of global health security, leading to the rise of an algorithmic governmentality within contemporary contexts of Big Data and these surveillance systems. Empirically, this article demonstrates how this new form of algorithmic infectious disease surveillance has been rapidly integrated into diplomatic, legal, and political frameworks to strengthen the practice of global health security – producing subtle, yet distinct shifts in the outbreak notification and reporting transparency of states, increasingly scrutinized by the algorithmic gaze of syndromic surveillance.Keywords: algorithms, global health, pandemic, surveillance
Procedia PDF Downloads 1853567 Entrepreneurship Training of Young People as a Pillar to Generate Income and Create Jobs: Progress Report of the Moroccan National Human Development Initiative in the Region of Meknes
Authors: Bennani Zoubir Nada, El Hiri Abderrazak, El Hajri Aimad
Abstract:
In context of economic and health crisis, sustainable entrepreneurship has become one of the best solutions to economic recovery. This study is about the third program of the Moroccan national human development initiative in her third phase which began in 2019 and continuous until 2023, and which deals with income improvement and social inclusion of young people, under the high patronage of his majesty the king of Morocco. What is the approach of this program and how entrepreneurship training of young people can be a pillar to generate income and create jobs? Starting on the effectuation theory, we adopted an exploratory qualitative approach through semi-structured interviews with national human development initiative stakeholders in the area of Meknes-Morocco, which allowed us the state of progress of this program. We carried out a survey based on a grid of questions to collect information that we processed using NVIVO software. The most relevant results are that people eligible are jobless young people, who are between 18 and 35 years old, who reside in Meknes and surroundings and who have a project idea. They are trained by experts in entrepreneurship and management through targeted and diversified courses. To ensure the sustainability of projects, the project organisers have provided measures to ensure the sustainability of the companies through continuous monitoring and evaluation as well as support during all phases from the project idea to the realisation and progress.Keywords: sustainable entrepreneurship, training, social inclusion, national human development initiative in Morocco (INDH), youth entrepreneurship, the effectuation theory
Procedia PDF Downloads 1103566 Published Financial Statement as a Correlate of Investment Decision among Commercial Bank Stakeholders in Nigeria
Authors: C. F. Popoola, K. Akinsanya, S. B. Babarinde, D. A. Farinde
Abstract:
This study investigated published financial statement as correlate of investment decision among commercial bank stakeholders in Nigeria. A correlation research design was used in the study. 180 users of published financial statement were purposively sampled from Lagos and Ibadan. Data generated were analyzed using Pearson correlation and regression. The findings of the study revealed that, balance sheet is negatively related with investment decision (r=-.483; p < .01) while income statement (r= .249; p < .001), notes on the account (r= .230; p < .001), cash flow statement (r= .202; p < .001), value added statement (r= .328; p < .001) and five-year financial summary (r= .191 ;p < .01) are positively related with investment decision. Findings also revealed that components of published financial statement significantly predicted good investment decision (R2= .983; F(5,175)=284.5; p < .05) for commercial bank stakeholders. Therefore, it was suggested that Nigeria banks and professional bodies should instigate programs that will increase the knowledge of stakeholders on published financial statement.Keywords: commercial banks, financial statement, income statement, investment decision, stakeholders
Procedia PDF Downloads 4593565 AMBICOM: An Ambient Computing Middleware Architecture for Heterogeneous Environments
Authors: Ekrem Aksoy, Nihat Adar, Selçuk Canbek
Abstract:
Ambient Computing or Ambient Intelligence (AmI) is emerging area in computer science aiming to create intelligently connected environments and Internet of Things. In this paper, we propose communication middleware architecture for AmI. This middleware architecture addresses problems of communication, networking, and abstraction of applications, although there are other aspects (e.g. HCI and Security) within general AmI framework. Within this middleware architecture, any application developer might address HCI and Security issues with extensibility features of this platform.Keywords: AmI, ambient computing, middleware, distributed-systems, software-defined networking
Procedia PDF Downloads 2843564 The Ever-Changing Connection Among Banks and Insurers: An Examination of the Financial Standing of the Financial System
Authors: Iqra Ali
Abstract:
This study uses panel Vector Auto Regression (VAR) to analyses the dynamic link between banking and insurance activities based on the asset size of the insurance industry for 73 countries between 1980 and 2014. Assets in the insurance industry and banking activities usually have a Granger causal link, according to panel Granger-causality tests. Impulse response analyses for the entire sample show that the size of insurance assets responds favorably to a shock to the liquid liabilities and deposits of the financial system but negatively to a shock to deposit money bank assets and private credit offered by commercial banks, other financial institutions, and deposit banks. While the findings for middle- and low-income nations varied significantly, the observations for high-income countries are essentially the same. Furthermore, we find that there is a substantial interplay between banking and insurance activity in civil law nations as opposed to common law ones.Keywords: vector autoregression, banking, insurance, Granger-causality
Procedia PDF Downloads 63563 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps
Authors: Mohamed Sarrab, Hadj Bourdoucen
Abstract:
Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.Keywords: mobile application, run-time verification, usable security, direct information flow
Procedia PDF Downloads 3813562 Addressing Urban Security Challenges in Nigeria through Neighborhood Renewal: A Reflection of Mokola World Bank Slum Upgrading Pilot Project
Authors: Tabiti S. Tabiti, A. M. Jinadu, Daramola Japheth
Abstract:
Urban insecurity is among the challenges militating against sustainable urban governance; in the first place it distorts the peace of urban areas making them unsafe. On the other hand it hinders the effective performance of urban functions. Urban security challenges manifest in different forms such as, street violence, theft and robbery, accidents of different types kidnapping, killings etc.. Efforts to address urban security challenges in Nigeria have been concentrated in legislative, law enforcement and the use of community vigilante groups. However in this study, the place of physical planning strategy through effective neighbourhood renewal as practiced in Mokola is presented as an effective complementary approach for addressing urban insecurity. On this backdrop, the paper recommends the need for gradual rehabilitation of urban slum neighborhoods by the state government in collaboration with World Bank and other development financiers. The local governments should be made autonomy in Nigeria so as to make them more responsible to the people. Other recommendations suggested in the paper include creating enabling environment that will promote economic empowerment and public enlightment on personal and community sanitation. It is certain that if these recommendations are adopted the challenge of urban insecurity will reduce significantly in Nigerian cities.Keywords: neighbourhood renewal, pilot project, slum upgrading, urban security
Procedia PDF Downloads 4373561 Distributed Energy Resources in Low-Income Communities: a Public Policy Proposal
Authors: Rodrigo Calili, Anna Carolina Sermarini, João Henrique Azevedo, Vanessa Cardoso de Albuquerque, Felipe Gonçalves, Gilberto Jannuzzi
Abstract:
The diffusion of Distributed Energy Resources (DER) has caused structural changes in the relationship between consumers and electrical systems. The Photovoltaic Distributed Generation (PVDG), in particular, is an essential strategy for achieving the 2030 Agenda goals, especially SDG 7 and SDG 13. However, it is observed that most projects involving this technology in Brazil are restricted to the wealthiest classes of society, not yet reaching the low-income population, aligned with theories of energy justice. Considering the research for energy equality, one of the policies adopted by governments is the social electricity tariff (SET), which provides discounts on energy tariffs/bills. However, just granting this benefit may not be effective, and it is possible to merge it with DER technologies, such as the PVDG. Thus, this work aims to evaluate the economic viability of the policy to replace the social electricity tariff (the current policy aimed at the low-income population in Brazil) by PVDG projects. To this end, a proprietary methodology was developed that included: mapping the stakeholders, identifying critical variables, simulating policy options, and carrying out an analysis in the Brazilian context. The simulation answered two key questions: in which municipalities low-income consumers would have lower bills with PVDG compared to SET; which consumers in a given city would have increased subsidies, which are now provided for solar energy in Brazil and for the social tariff. An economic model was created for verifying the feasibility of the proposed policy in each municipality in the country, considering geographic issues (tariff of a particular distribution utility, radiation from a specific location, etc.). To validate these results, four sensitivity analyzes were performed: variation of the simultaneity factor between generation and consumption, variation of the tariff readjustment rate, zeroing CAPEX, and exemption from state tax. The behind-the-meter modality of generation proved to be more promising than the construction of a shared plant. However, although the behind-the-meter modality presents better results than the shared plant, there is a greater complexity in adopting this modality due to issues related to the infrastructure of the most vulnerable communities (e.g., precarious electrical networks, need to reinforce roofs). Considering the shared power plant modality, many opportunities are still envisaged since the risk of investing in such a policy can be mitigated. Furthermore, this modality can be an alternative due to the mitigation of the risk of default, as it allows greater control of users and facilitates the process of operation and maintenance. Finally, it was also found, that in some regions of Brazil, the continuity of the SET presents more economic benefits than its replacement by PVDG. However, the proposed policy offers many opportunities. For future works, the model may include other parameters, such as cost with low-income populations’ engagement, and business risk. In addition, other renewable sources of distributed generation can be studied for this purpose.Keywords: low income, subsidy policy, distributed energy resources, energy justice
Procedia PDF Downloads 1123560 Mobile Payment over NFC: The M-Check System Case
Authors: Karima Maazouz, Habib Benlahmer, Naceur Achtaich
Abstract:
The realization of mobile payments will make possible new and unforeseen ways of convenience and m-commerce. Mobile payment today benefit from technology and trends. NFC technology is creating a new era of contactless mobile payment. the “M-check” is a mobile payment system provides a new way facilitating transaction with high valued payment and enable new m-commerce. The objective of the paper is to propose a new solution for m-payment. The proposed combination of m-check system and NFC offers acceptable security for payment mobile, client’s satisfaction, and simplifies the process payment between clients and merchants.Keywords: M-payment, NFC, M-check, M-commerce, security
Procedia PDF Downloads 5973559 Password Cracking on Graphics Processing Unit Based Systems
Authors: N. Gopalakrishna Kini, Ranjana Paleppady, Akshata K. Naik
Abstract:
Password authentication is one of the widely used methods to achieve authentication for legal users of computers and defense against attackers. There are many different ways to authenticate users of a system and there are many password cracking methods also developed. This paper is mainly to propose how best password cracking can be performed on a CPU-GPGPU based system. The main objective of this work is to project how quickly a password can be cracked with some knowledge about the computer security and password cracking if sufficient security is not incorporated to the system.Keywords: GPGPU, password cracking, secret key, user authentication
Procedia PDF Downloads 2903558 Integrative System of GDP, Emissions, Health Services and Population Health in Vietnam: Dynamic Panel Data Estimation
Authors: Ha Hai Duong, Amnon Levy Livermore, Kankesu Jayanthakumaran, Oleg Yerokhin
Abstract:
The issues of economic development, the environment and human health have been investigated since 1990s. Previous researchers have found different empirical evidences of the relationship between income and environmental pollution, health as determinant of economic growth, and the effects of income and environmental pollution on health in various regions of the world. This paper concentrates on integrative relationship analysis of GDP, carbon dioxide emissions, and health services and population health in context of Vietnam. We applied the dynamic generalized method of moments (GMM) estimation on datasets of Vietnam’s sixty-three provinces for the years 2000-2010. Our results show the significant positive effect of GDP on emissions and the dependence of population health on emissions and health services. We find the significant relationship between population health and GDP. Additionally, health services are significantly affected by population health and GDP. Finally, the population size too is other important determinant of both emissions and GDP.Keywords: economic development, emissions, environmental pollution, health
Procedia PDF Downloads 6263557 A Graph Theoretic Algorithm for Bandwidth Improvement in Computer Networks
Authors: Mehmet Karaata
Abstract:
Given two distinct vertices (nodes) source s and target t of a graph G = (V, E), the two node-disjoint paths problem is to identify two node-disjoint paths between s ∈ V and t ∈ V . Two paths are node-disjoint if they have no common intermediate vertices. In this paper, we present an algorithm with O(m)-time complexity for finding two node-disjoint paths between s and t in arbitrary graphs where m is the number of edges. The proposed algorithm has a wide range of applications in ensuring reliability and security of sensor, mobile and fixed communication networks.Keywords: disjoint paths, distributed systems, fault-tolerance, network routing, security
Procedia PDF Downloads 4423556 Static Analysis of Security Issues of the Python Packages Ecosystem
Authors: Adam Gorine, Faten Spondon
Abstract:
Python is considered the most popular programming language and offers its own ecosystem for archiving and maintaining open-source software packages. This system is called the python package index (PyPI), the repository of this programming language. Unfortunately, one-third of these software packages have vulnerabilities that allow attackers to execute code automatically when a vulnerable or malicious package is installed. This paper contributes to large-scale empirical studies investigating security issues in the python ecosystem by evaluating package vulnerabilities. These provide a series of implications that can help the security of software ecosystems by improving the process of discovering, fixing, and managing package vulnerabilities. The vulnerable dataset is generated using the NVD, the national vulnerability database, and the Snyk vulnerability dataset. In addition, we evaluated 807 vulnerability reports in the NVD and 3900 publicly known security vulnerabilities in Python Package Manager (pip) from the Snyk database from 2002 to 2022. As a result, many Python vulnerabilities appear in high severity, followed by medium severity. The most problematic areas have been improper input validation and denial of service attacks. A hybrid scanning tool that combines the three scanners bandit, snyk and dlint, which provide a clear report of the code vulnerability, is also described.Keywords: Python vulnerabilities, bandit, Snyk, Dlint, Python package index, ecosystem, static analysis, malicious attacks
Procedia PDF Downloads 1393555 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service
Authors: Mabrouka Algherinai, Fatma Karkouri
Abstract:
Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.Keywords: SMS, RSA, McEliece, RABIN
Procedia PDF Downloads 1633554 Socio-economic Baselining of Selected Icrmp Sites in Southwestern Cebu, Central Philippines
Authors: Rachel Luz P. Vivas-rica, Gloria G. Delan, Christine M. Corrales, Alfonso S. Piquero, Irene A. Monte
Abstract:
ABSTRACT -Selected Integrated Coastal Resource Management Program (ICRMP) sites in Southwestern Cebu were studied employing a stratified proportional sampling method using semi-structured questionnaires. Four hundred sixteen (416) respondents from five barangays with Marine Protected Areas (MPAs) and four barangays without marine sanctuaries were considered in the study. Results showed similarity of socio-economic characteristics in terms of average age, majority were middle aged, and married. Households were male dominated, obtained low education for both MPA and Non-MPA areas. In terms of occupation, majority in both areas engaged in fulltime fishing however part time jobs as carpenter, construction worker, driver or farmer as another income source. Most of the households were nuclear families with average family size of five for both MPA and Non-MPA. Fishing experience ranged from less than 1 year to more than 50 years. Fishing grounds were within the 15 kilometer radius of each considered site. Even if the respondents were totally dependent on fishing as a major source of income, still their income is way below the poverty threshold both in the MPA and Non-MPA areas. This is further explained by the marginality of their fishing implements wherein majority uses gill nets, hook & line, spear and paddle boat in fishing. Their volume of catch from an average of 6 hours fishing expedition ranges from half a kilo to a maximum of 4 kilos. Majority are not members of fishing groups or organizations.Keywords: integrated coastal resource management program, marine protected areas, socio-economic, poverty threshold
Procedia PDF Downloads 5183553 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics
Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova
Abstract:
We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.Keywords: cybersecurity, epidemiology, cyber epidemiology, malware
Procedia PDF Downloads 1073552 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services
Authors: Rachna Jain, Sushila Madan, Bindu Garg
Abstract:
Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service
Procedia PDF Downloads 3343551 Assessing Household Energy Savings and Consumer Behavior in Padang City
Authors: Prima Fithri, Lusi Susanti, Karin Bestarina
Abstract:
Indonesia's electrification ratio is still around 80.1%, which means that approximately 19.9% of households in Indonesia have not been getting the flow of electrical energy. Household electricity consumptions in Indonesia are generally still dominated by the public urban. In the city of Padang, West Sumatera, Indonesia, about 94.10% are power users of government services (PLN). The most important thing of the issue is human resources efficient energy. Consumer behavior in utilizing electricity becomes significant. Intensive questioner survey, in-depth interview and statistical analysis are carried out to collect scientific evidences of the behavioral based changes instruments to reduce electricity consumption in household sector. The questioner was developed to include five factors assuming affect the electricity consumption pattern in household sector. They are: attitude, energy price, household income, knowledge and other determinants. The survey was carried out in Padang, West Sumatra Province Indonesia. About 210 questioner papers were proportionally distributed to households in 11 districts in Padang. Stratified sampling was used as a method to select respondents. The results show that the household size, income, payment methods and size of house are factors affecting electricity saving behavior in residential sector. Household expenses on electricity are strongly influenced by gender, type of job, level of education, size of house, income, payment method and level of installed power. These results provide a scientific evidence for stakeholders on the potential of controlling electricity consumption and designing energy policy by government in residential sector.Keywords: electricity, energy saving, household, behavior, policy
Procedia PDF Downloads 5233550 Profiling the Food Security Status of Farming Households in Chanchaga Area of Nigeria’s Guinea Savana
Authors: Olorunsanya E. O., Adedeji S. O., Anyanwu A. A.
Abstract:
Food insecurity is a challenge to many nations Nigeria inclusive. It is increasingly becoming a major problem among farm households due to many factors chief of which is low labour productivity. This study therefore profiles the food security status of a representative randomly selected 90 farming households in Chanchaga area of Nigeria’s Guinea Savana using structured interview schedule Descriptive and inferential statistics were used as analytical tools for the study. The results of the descriptive statistics show that majority (35.56%) of the surveyed household heads fall within the age range of 40 – 49 years and (88.89%) are male while (78.89) are married. More than half of the respondents have formal education. About 43.3% of the household heads have farm experience of 11- 20 years and a modal household size class range of 7 – 12. The results further reveal that majority (68.8%) earned more than N12, 500 (22.73 US Dollar) per month. The result of households’ food expenditure pattern reveals that an average household spends about N3, 644.44 (6.63 US Dollar) on food and food items on a weekly basis. The result of the analysis of food diversity intake in the study area shows that 63.33% of the sampled households fell under the low household food diversity intake, while 33 households, representing 36.67% ranks high in term of household food diversity intake. The result for the food security status shows that the sampled population was food secure (58.89%) while 41.11% falls below the recommended threshold. The result for the logistics regression model shows that age, engagement in off farm employment and household size are significant in determining the food security status of farm household in the study area. The three variables were significant at 10%, 5% and 1% respectively. The study therefore recommends among others, that measures be put in place by stakeholders to make agriculture attractive for youth since age is a significant determinant of food security in the study area. Awareness should also be created by stakeholders on the needs for effective family planning methods to be adopted by farm household in the study area.Keywords: Niger State, Guinea Savana, food diversity, logit regression model and food security
Procedia PDF Downloads 1063549 The Impact of Artificial Intelligence on Pharmacy and Pharmacology
Authors: Mamdouh Milad Adly Morkos
Abstract:
Despite having the greatest rates of mortality and morbidity in the world, low- and middle-income (LMIC) nations trail high-income nations in terms of the number of clinical trials, the number of qualified researchers, and the amount of research information specific to their people. Health inequities and the use of precision medicine may be hampered by a lack of local genomic data, clinical pharmacology and pharmacometrics competence, and training opportunities. These issues can be solved by carrying out health care infrastructure development, which includes data gathering and well-designed clinical pharmacology training in LMICs. It will be advantageous if there is international cooperation focused at enhancing education and infrastructure and promoting locally motivated clinical trials and research. This paper outlines various instances where clinical pharmacology knowledge could be put to use, including pharmacogenomic opportunities that could lead to better clinical guideline recommendations. Examples of how clinical pharmacology training can be successfully implemented in LMICs are also provided, including clinical pharmacology and pharmacometrics training programmes in Africa and a Tanzanian researcher's personal experience while on a training sabbatical in the United States. These training initiatives will profit from advocacy for clinical pharmacologists' employment prospects and career development pathways, which are gradually becoming acknowledged and established in LMICs. The advancement of training and research infrastructure to increase clinical pharmacologists' knowledge in LMICs would be extremely beneficial because they have a significant role to play in global healthKeywords: electromagnetic solar system, nano-material, nano pharmacology, pharmacovigilance, quantum theoryclinical simulation, education, pharmacology, simulation, virtual learning low- and middle-income, clinical pharmacology, pharmacometrics, career development pathways
Procedia PDF Downloads 813548 Feasibility Study of Iraq' Decomposition and Its Effects on the Region
Authors: Ebrahim Rahmani, Siyamak Moazeni
Abstract:
According to the Iraq's first constitutional law (approved 2005), Iraq is an independent with sovereignty and its governmental structure is parliamentary democratic republic and federal. Even in reforms in 2009, this article of law did not changed at all. But considering the existence of this emphasis and clarity which is mentioned in the law, different and sometimes contradictory interpretations and positions are expressed about federalism in the way that we can say, considering the importance of the matter, federalism is a focus point to create and expansion of the cold war among leaders of different groups of the country. Iraq's today political and security position has granted the suitable opportunity to Iraq's Kurdistan in appearing of the recent security crisis to increase its share from the central political power or to achieve to its independent dream. The federalism the weakest point of Iraq's territorial integrity in a way that if different groups do not come to a consensus about it and do not think about a mechanism which is accepted by all of them, this can effect on and Iraq's political stability and security. Iraq's Kurdistan follows the option of disintegration and separation under the shadow of political and security changes, even with existence of some Iraqi groups' hopes regarding the improvement of situation after parliament election and also considering Masoud Barezani's power will for separation from Iraq as well as regarding special international changes and disintegration of Karime from Ukraine and ISIS crises; concerns have been created among regional and international powers and interior players. In this article, a paradox due constitutional law about federalism, Iraq's central government view and its politicians to the matter and the regional effect of this action on region's geopolitics are reviewed as well.Keywords: constitutional law, federalism, decomposition, Iraq's Kurdistan
Procedia PDF Downloads 3283547 Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures
Authors: Mastoor Qubra
Abstract:
Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies.Keywords: attribution, critical infrastructure, cyber terrorism, global cooperation
Procedia PDF Downloads 2693546 Personal and Household Hygiene Measures for Prevention of Upper Respiratory Tract Infections among Children: A Cross Sectional Survey on Parental Knowledge, Attitudes and Practices
Authors: Man Wai Leung, Margaret O’Donoghue, Lorna K. P. Suen
Abstract:
Personal and household hygiene measures are important to prevent upper respiratory tract infections (URTIs) and other infectious diseases, including coronavirus disease 2019 (COVID-19). An online survey recruited 414 eligible parents in Hong Kong to study their hygiene knowledge, attitudes, and practices (KAP) in the prevention of URTIs among their children. The average knowledge score was high (10.2/12.0), but some misconceptions were identified. The majority of participants agreed that good personal hygiene (93.5%) and good environmental hygiene (92.8%) can prevent URTIs. The average score for hand hygiene practices was high (3.78/4.00), but only 56.8% of parents always perform hand hygiene before touching their mouth, nose, or eyes. For environmental hygiene, only some household items were disinfected with disinfectants (69.8%: door handles, 60.4%: toilet seats, 42.8%: floor, 24.2%: dining chairs, 20.5%: dining tables). Higher knowledge score was associated with parents having a tertiary educational level or above, working as healthcare professionals, living at private residential flat or staff quarter, and having a household income of $70,000 or above. Hand hygiene practices varied significantly with parents’ age and income. During the 5th wave of the COVID-19 epidemic, misconceptions about hygiene knowledge were found among parents. Health promotion programs should target parents, especially those who are in old age, obtain lower educational levels, live in public housing, or have a lower income. Hand hygiene moments and proper use of disinfectants could be one of the targeted educational topics.Keywords: hygiene, upper respiratory tract infection, parents, children, COVID-19
Procedia PDF Downloads 113